Category Archives: Vigenere Cipher

Prying Telephone Operators and Free Radio Waves: Implications of New Tech on Secure Messages

Because the onset of the telegraph inserted a middleman in the communication of a sender and receiver, messages not meant for prying eyes understandably needed to be encrypted with a more secure cipher like the Vigenère cipher. Since the invention of the telegraph in the 19thcentury, several other inventions or innovations in the world of […] Continue reading

Posted in privacy, radio, Student Posts, telephone, Vigenere Cipher | Comments Off on Prying Telephone Operators and Free Radio Waves: Implications of New Tech on Secure Messages

Breaking (Almost) Unbreakable Ciphers

The strength of the Vigenère Cipher depends largely on the length of the keyword. If the keyword is just one letter, then it is nothing more than a simple shift cipher; if the keyword is the same length as the plain text, there will be little to no discernable pattern. However, Singh clearly demonstrates that even with […] Continue reading

Posted in cryptanalysis, Student Posts, Unbreakable cipher, Vigenere Cipher | Comments Off on Breaking (Almost) Unbreakable Ciphers

Technologies Effect on Cryptography

The advent of the telegraph was a major factor in the use of the Vigenère Cipher. Due to the Vigenère Cipher having 60 cipher alphabets, the methods of encrypted methods not only increased but became ideal for technology such as the telegraph.  What makes the telegraph go well with the Vigenère cipher is that it brought more security […] Continue reading

Posted in ciphers, Crypotgraphy, Student Posts, telegraph, Vigenere Cipher | Comments Off on Technologies Effect on Cryptography

The Smithy Code: A Look Into Multiple Encryption

On Elonka’s website, there is an explanation and solution to the Smithy Code. The Smithy Code was embedded in the ruling for a plagiarism trial concerning Dan Brown’s The Da Vinci Code. Justice Peter Smith italicized several letters which spelled out “S m i t h y c o d e J a e i e […] Continue reading

Posted in caesar shift, Elonka Dunin, polyalphabetic substitution, Student Posts, the da vinci code, the smithy code, Vigenere Cipher | Comments Off on The Smithy Code: A Look Into Multiple Encryption

4 Codes, 1 Sculpture: Kryptos

During the talk Elonka gave to the class on Friday, I found myself fixating on one thing, Kryptos. I was so surprised by the fact that there was a statue located on the grounds of the CIA, which has an unsolved code written on it. The CIA are supposed to be some of the greatest […] Continue reading

Posted in amateur cryptography, Elonka Dunin, Kryptos, Student Posts, Vigenere Cipher | Comments Off on 4 Codes, 1 Sculpture: Kryptos

Environments that promote or discourage confidence in codes

Before the development of the Vigenère cipher, those sending encrypted messages understood that if the message was found, any good codebreaker would be able to decipher it. Mary Queen of Scots experienced a very different environment. She had total faith … Continue reading Continue reading

Posted in confidence, Mary Queen of Scots, security, Singh, Student Posts, Vigenere Cipher | Comments Off on Environments that promote or discourage confidence in codes

Persistence is the "key"

New things can seem very challenging at first. For example, a question seems so much simpler when we already have an answer to it. However, the question without the answer can seem very daunting, making it seem too difficult to … Continue reading Continue reading

Posted in Babbage, Student Posts, Unbreakable, Vigenere Cipher | Comments Off on Persistence is the "key"

The Value of Privacy

Why do you think that the advent of the telegraph motivated the use of a more secure cipher like the Vigenère cipher? Prior to the telegraph, much of the communication was done so through hand written or typed correspondence. There … Continue reading Continue reading

Posted in " communication, privacy, Student Posts, Vigenere Cipher | Comments Off on The Value of Privacy